Sciweavers

3651 search results - page 90 / 731
» Data Mining for Security Applications
Sort
View
93
Voted
DAWAK
2003
Springer
15 years 5 months ago
Automatic Detection of Structural Changes in Data Warehouses
Data Warehouses provide sophisticated tools for analyzing complex data online, in particular by aggregating data along dimensions spanned by master data. Changes to these master da...
Johann Eder, Christian Koncilia, Dieter Mitsche
123
Voted
IS
2007
15 years 16 days ago
Business process mining: An industrial application
Contemporary information systems (e.g., WfM, ERP, CRM, SCM, and B2B systems) record business events in so-called event logs. Business process mining takes these logs to discover p...
Wil M. P. van der Aalst, Hajo A. Reijers, A. J. M....
127
Voted
PARCO
1997
15 years 1 months ago
Parallel Database Techniques in Decision Support and Data Mining
During the last decade, all commercial database systems have included features for parallel processing into their products. This development has been driven by the fact that datab...
Andreas Reuter
117
Voted
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
14 years 10 months ago
Data Editing Techniques to Allow the Application of Distance-Based Outlier Detection to Streams
The problem of finding outliers in data has broad applications in areas as diverse as data cleaning, fraud detection, network monitoring, invasive species monitoring, etc. While th...
Vit Niennattrakul, Eamonn J. Keogh, Chotirat Ann R...
DMIN
2006
141views Data Mining» more  DMIN 2006»
15 years 2 months ago
Detecting Cheats In Online Student Assessments Using Data Mining
: We can find several online assessment applications, Windows oriented or Web based, licensed or gnu free software, proprietary or standardized. All of them executing basic questio...
Genadiy Burlak, Jaime Muñoz, Alberto Ochoa,...